fkie_cve-2012-1151
Vulnerability from fkie_nvd
Published
2012-09-09 21:55
Modified
2024-11-21 01:36
Severity ?
Summary
Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536
secalert@redhat.comhttp://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2012-1116.html
secalert@redhat.comhttp://secunia.com/advisories/48307Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48319Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/48824
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201204-08.xml
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2431
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:112
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/03/09/6
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/03/10/4
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=801733
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/73854
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/73855
secalert@redhat.comhttps://rt.cpan.org/Public/Bug/Display.html?id=75642
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536
af854a3a-2127-422b-91ae-364da2661108http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-1116.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48307Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48319Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48824
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201204-08.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2431
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:112
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/03/09/6
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/03/10/4
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=801733
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/73854
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/73855
af854a3a-2127-422b-91ae-364da2661108https://rt.cpan.org/Public/Bug/Display.html?id=75642
Impacted products
Vendor Product Version
perl perl *
perl perl 0.1
perl perl 0.2
perl perl 0.3
perl perl 0.4
perl perl 0.5
perl perl 0.52
perl perl 0.61
perl perl 0.62
perl perl 0.63
perl perl 0.64
perl perl 0.65
perl perl 0.66
perl perl 0.67
perl perl 0.68
perl perl 0.69
perl perl 0.70
perl perl 0.71
perl perl 0.72
perl perl 0.73
perl perl 0.80
perl perl 0.81
perl perl 0.82
perl perl 0.83
perl perl 0.84
perl perl 0.85
perl perl 0.86
perl perl 0.87
perl perl 0.88
perl perl 0.89
perl perl 0.90
perl perl 0.91
perl perl 0.92
perl perl 0.93
perl perl 0.94
perl perl 0.95
perl perl 0.96
perl perl 0.97
perl perl 0.98
perl perl 0.99
perl perl 1.00
perl perl 1.01
perl perl 1.20
perl perl 1.21
perl perl 1.22
perl perl 1.31
perl perl 1.32
perl perl 1.40
perl perl 1.41
perl perl 1.42
perl perl 1.43
perl perl 1.44
perl perl 1.45
perl perl 1.46
perl perl 1.47
perl perl 1.48
perl perl 1.49
perl perl 2.0.0
perl perl 2.1.0
perl perl 2.1.1
perl perl 2.1.2
perl perl 2.1.3
perl perl 2.2.0
perl perl 2.2.1
perl perl 2.2.2
perl perl 2.3.0
perl perl 2.4.0
perl perl 2.5.0
perl perl 2.5.1
perl perl 2.6.0
perl perl 2.6.1
perl perl 2.6.2
perl perl 2.6.3
perl perl 2.6.4
perl perl 2.6.5
perl perl 2.6.6
perl perl 2.7.0
perl perl 2.7.1
perl perl 2.7.2
perl perl 2.8.0
perl perl 2.8.1
perl perl 2.8.2
perl perl 2.8.3
perl perl 2.8.4
perl perl 2.8.5
perl perl 2.8.6
perl perl 2.8.7
perl perl 2.8.8
perl perl 2.9.0
perl perl 2.9.1
perl perl 2.9.2
perl perl 2.10.0
perl perl 2.10.1
perl perl 2.10.2
perl perl 2.10.3
perl perl 2.10.4
perl perl 2.10.5
perl perl 2.10.6
perl perl 2.10.7
perl perl 2.11.0
perl perl 2.11.1
perl perl 2.11.2
perl perl 2.11.3
perl perl 2.11.4
perl perl 2.11.5
perl perl 2.11.6
perl perl 2.11.7
perl perl 2.11.8
perl perl 2.12.0
perl perl 2.13.0
perl perl 2.14.0
perl perl 2.14.1
perl perl 2.15.0
perl perl 2.15.1
perl perl 2.16.0
perl perl 2.16.1
perl perl 2.17.0
perl perl 2.17.1
perl perl 2.17.2
perl perl 2.18.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "736230E6-7071-4650-8FB0-DD5624C9172C",
              "versionEndIncluding": "2.18.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1EF38B8-36B2-4F21-8F41-D0CDE28CDE43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE4F0BB5-7DB7-4CC6-83C5-D8C84DC2A863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEC53956-98C5-4355-8670-9BB4A479BCC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB8269B-270B-455F-94B1-0F1025041EE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3460B9A-89F5-4F3C-80DB-0DE6099D64E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "40C34F0C-B9A4-4AB4-8B34-44A65103DBBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "65434B07-D9FB-4D3A-B63C-48DA7ED603EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C634C91-BFD6-480A-ABC9-557066A11E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92F2903-486A-4656-8E43-AF6D9E475A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "47C86A61-CBDF-40A1-AC66-AB452C1C4FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "519DD527-BFE9-4166-A391-127FB8EDFA81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "66842472-632B-4505-B3E0-32C59AA73AA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "34774222-0D33-41F0-A917-09B044A53800",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4C35D3-8169-41AA-8719-5E2D32DEF265",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "2880F00C-B64E-4B69-9FFD-FFAF00E0EA31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "978875E8-61E6-43C8-8E1B-BAA9BFE696E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A9FB3A-ABF7-44E5-B3F3-C24E3FC2E440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E2B3B94-DA75-44A8-B13B-004989615B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "E758B292-C06F-4AF7-99B9-2BC49533C25A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "49F89A9B-4EAA-41A0-AEB6-16B7A7C13127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "110AB146-D842-49AE-A6FB-15574D94F556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "187FE6D6-7785-45C3-9FAF-C55AC370FD7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "F05B9866-08CD-4A32-8B59-4AA3818B2B5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "C662A095-27AD-41B1-B92C-3352A68001DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "890F038F-7668-4D67-8787-385145DE7F0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "27C2A9DD-5A7D-489F-B2B2-BA2DD1FE5385",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "98419B2D-7EF8-4F16-A95D-93D4C097F10A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "F071074B-25A2-4ADA-AA51-DD5E07E44EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "3795B65D-4B65-419E-8ADC-8806BE12E0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "17578EF4-677D-4C0D-AE02-0B59EDF19CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "93DEF1EF-0286-4603-B9D8-05908189184A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A170ED4-8B94-4C09-A5D5-B6A9A5D04AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "0990BD24-ED47-44EF-962D-4737DD295D5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B0D454-CD0E-4BF1-A516-A4A5E19A447D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D12BD17-3FBE-4917-9D44-4135FC857CBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF110E96-77E7-4BF9-9309-606E02871360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C44DEA9-D1CC-4D6F-BFB4-F20BA8CBD837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "00ABCC48-9B7E-4312-8B64-44399409EDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:0.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8D8793-F072-4C7A-84B5-79EB6D0541BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DA44592-DC6D-4FB7-AC1D-A300643922C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EBE0151-85BA-449C-880F-E23D8C446D8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "83F3ED90-9586-41DB-9B83-C6B05C605213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DB562AC-B665-4F2B-B004-9E848ACC7C20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "8305CB5A-A64A-4F11-B912-B2E428513E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "367FF98C-12FF-4CEC-9870-6356FAD3C523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "191EDFB5-F9AB-4A8B-BFC7-9BB7BCE7AAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "A253AEB7-A581-4E1F-9410-E056390C0BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "2696ACCA-47FC-4D25-8A08-17F7CD640040",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F9F981-903A-48F8-ACD9-48308E639261",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "99E7410D-A498-49FB-818E-309BDBDB7A21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "85BE0085-3E86-4A39-8AE4-76ED06D2534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "2614B8FD-F7A5-4C70-AE1E-2255FCAB1154",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "58387159-A167-4032-9F3F-B517EF2185F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB414CE9-5EFA-45F7-BB0B-B8B3893444DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "93FBE9FB-99AC-4800-BB1F-4F0689E0A07A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB83944-0183-4DDB-B20E-0C8A7646A07F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "80151ACD-28DC-4383-9B7E-F2B759299341",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C15294D-F2AC-4E81-A612-14A31510449D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF2EE2D3-A942-4CAE-8F14-213BB6CBD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "05630C5E-263A-4974-81A0-2DC178B9708C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B372AF6-29BB-4DAA-B3DA-3F8AE7BBC5BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17CD4D0-DFE5-4C01-BEEA-891C865E18AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EEB7512-D7E2-4F24-B96F-4FFE9E650262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "307F457C-4015-4857-ADB8-637BC53DEB54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B645F9A1-44FB-4504-BF6C-2810EE841025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E91B29C4-3709-473E-8F69-69D77ECEB221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB3068F9-9A65-4DC4-88C2-19C8E1807CED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADDA896A-8EA8-4924-A648-6001F83F8AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "91611ED9-FFDE-42B2-8E02-5B089A34DB33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "638055BA-CB01-404E-B9CD-D9EEB284ACE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "54F33281-2EA9-49EF-A074-E0AE93D4DC72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EA4A6E5-F1A0-42E8-BB49-E06497DA582B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "085763C4-D71A-47AF-B64C-829E6EC8E6D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9805F52C-B9F4-4531-A478-C3FA03D1EA59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1183DBED-4EF7-4942-9400-D57BC0C63773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FCE3D75-98D9-4D95-9EB9-F33E37CC047B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58228B5F-7FA1-42B5-BC4A-A5F6535E2C39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7D4C885-1FDB-479C-9626-B006E1C84E0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6574874E-EE2A-43B0-9D4B-9106C46BF8AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A4C415-6408-4A7E-A1C9-8A327B0DEA59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B35E250-F525-4EF5-9DBD-D80D68E5C00E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79388C94-3306-4FD2-880E-56D42830B822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E181D243-AFF0-41E3-A969-3DC67E81E8A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D445C68D-BFB8-4BAB-B995-FADF7CA5DF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8982A13-3F5E-4B52-932C-00BD7CEA7625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0518BBC-BE6F-4949-A39B-1BE1FFA9442D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5F66A1-E3C6-4D89-B3E3-AF46CC98BB00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8090363F-1850-4095-A212-0A554EA37A3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FA77D7-CE3B-4ED2-8117-E6CC1BA39B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4687A27-D41C-489D-AA95-E6999ABB696D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C03AD0EA-BFB8-480D-9B9C-6D6BD0DABDB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "59BADDB6-D48A-4DC0-A758-902F0EBC51CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D12770F8-8729-4712-9023-64CB2B374BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A7FD104-1DE9-4A2A-AB2B-CD4AD9E70A93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A33D85D8-AA73-4120-9DB0-85B9E0BC14F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "079B9B47-194A-4047-AFEB-ABAD9CA5E53E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "98034760-4DF2-4D7B-92D8-02EDCF56E618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB7B211-AFE1-4D1A-B46F-86394981D5D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "930C1B45-2ABE-42DD-8D10-B375ED796F4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5811AB6-ED08-40C9-A0CD-77793A495E81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "82185F66-9E19-4C56-8E77-5C153275A542",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E51FAC0-BEF4-4839-B3C0-CCC9ED015582",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D902DF16-5F3A-485E-9409-BC47A4E46014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8FA7E4-B406-4587-86A7-F560FE64A3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "77C35F36-AD3C-418C-ACED-486FF06EFFC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B28DF2CD-1BEC-4F5E-AD30-7F84E58DF223",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3960D793-C3C8-40FC-83B2-710ED2F5D658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DDE4919-FA8A-485B-9F0E-BD015B1D4D8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC022C7A-35DD-445D-B9D3-6024CF28610E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D408D9-B90D-495A-BC09-E322FBE78E06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D00E45-E017-43AB-AAF9-9B4721CD8E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDB7238-FD06-4872-A736-9D988A0433E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "676C7999-B586-40E0-83E8-EB09E3F107C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B80A50-5766-4ED7-9254-5CDDB74C7C04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF88AD1-AECE-4227-AE63-EA3E279238C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED441D3-6D17-4F8E-AF0E-27D813B2C68F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "22CAAB68-FD86-49DB-8DA7-F16FC3F6B878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DF19BA4-1BF5-4F1E-BE6C-318B581D1EB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EE9535-B8AB-4DC8-A012-405FDEF88CA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de formato de cadena en dbdimp.c en el m\u00f3dulo DBD::Pg (tambi\u00e9n conocido como DBD-Pg o libdbd-pg-perl) anteriores a c2.19.0 en Perl, permite a servidores remotos de bases de datos a provocar una denegaci\u00f3n de servicio (ca\u00edda de proceso) a trav\u00e9s de unos especificadores de formato de cadena en (1) una advertencia de la base de datos sobre la funci\u00f3n pg_warn o (2) una declaraci\u00f3n DBD manipulada  sobre la funci\u00f3n dbd_st_prepare."
    }
  ],
  "id": "CVE-2012-1151",
  "lastModified": "2024-11-21T01:36:32.673",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-09-09T21:55:05.213",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-1116.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48307"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48319"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48824"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201204-08.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2431"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:112"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/09/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/10/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801733"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73854"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73855"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-1116.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48307"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/48319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48824"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201204-08.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/09/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/03/10/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801733"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75642"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.